Woman touching a phishing concept

Gen Z most likely to fall for phishing attacks

A new survey reveals that 44 percent of all participants admit to having interacted with a phishing message in the last year. Gen Z stands out as the…

By Ian Barker -

Latest Technology News

data breach

Majority of data breaches occur in US

There have been 1,673 data breaches last year. They have led to 707 million data records being compromised. Those are the results of a new report by digital security firm Gemalto, entitled Breach Level Index.

The Breach Level Index tracks all data breaches worldwide, looking at their size, severity, as well as the number of records compromised.

By Sead Fadilpašić -
Windows 10

Windows 10 Insider Preview Redstone Build 14271 arrives on the Fast ring, and there's an update for Mobile too

Windows 10 Insider Preview Build 14267 arrived on the Fast ring 6 days ago and brought some very welcome improvements with it, including three additions to Microsoft Edge, although sadly still no support for extensions.

Today Microsoft rolls out another Fast ring update, Build 14271, and also an update for Mobile, Build 14267.1004. This is the first time the software giant has released new builds for PC and mobile on the same day.

By Wayne Williams -
amazon-fire-tv

Alexa, find updates for Amazon Fire TV and Kindle

We knew updates were on the way to various Amazon products, but with a gradual roll out it was hard to say when things would arrive. Today the waiting is over, as both Fire TV and Kindle picked up the latest updates from the retail giant.

So what is in the cards for these updates? Well, lots of cool things that can prove useful to the company's multitude of customers.

By Alan Buckingham -
Risk dial

Former employees are a major security threat

If you’re a business owner in the UK, chances are a good portion of your workers are looking for the first opportunity to ditch you.

According to a new report by Ilex International, the identity and access management firm, 59 percent of workers are looking for a new job in 2016. Two reasons are behind this: first that the majority feels underpaid, and the second is that the economy is improving and better prospects are out there.

By Sead Fadilpašić -
breastcancer

Samsung using Android to fight breast cancer

Cancer sucks. All variants of the scourge are terrible, but for women breast cancer is one of the worst.

Luckily, there are many resources being focused on curing and treating cancer. Today, Samsung announces a partnership with the American Cancer Society, and a company called Breezie, to support a pilot aimed at fighting breast cancer with specialized Android tablets. This pilot, called MyJourney Compass, will provide focused and relevant information to individual breast cancer patients.

By Brian Fagioli -
Dragonboard-410

Canonical chooses Linux-friendly Dragonboard 410c as Ubuntu Core on ARM 64-bit reference

Linux is such a wonderful kernel for many reasons, but I find its adaptability to be the tops. You can get an operating system based on the kernel running on such a broad range of hardware -- something Microsoft can only dream about with its venerable Windows.

Even though Linux can run on damn-near anything, it is beneficial for developers to have a reference platform to use for creating. Of course, they can always expand from that jumping point. Today, Canonical announces that the Dragonboard 410c hardware will be the reference platform for Ubuntu Core on ARM 64-bit.

By Brian Fagioli -
CloudReady.200.175

Run a virtual Chromebook on your PC desktop

CloudReady is a custom version of Chromium OS which can transform your old PC into a sort-of Chromebook.

You can run CloudReady standalone, dual boot with Windows in some situations, or use VirtualBox to run it in a window on your desktop.

By Mike Williams -
Breach detection

CrowdStrike improves ability to combat breaches

Effective cyber security is all about seeing threats and being able to respond to them quickly and effectively. Increasingly this means using the cloud to deliver intelligence.

CrowdStrike, a specialist in cloud-delivered protection, is launching a new version of its Falcon platform to deliver endpoint, detection and response functions along with advanced antivirus capabilities.

By Ian Barker -
Xiaomi Mi 4s 2

Xiaomi announces Mi 4s, an updated version of its former flagship

On top of unveiling its new Mi 5 flagship, at MWC 2016 Xiaomi has also announced an updated version of its previous top-of-the-line smartphone, Mi 4. Called Mi 4s, the new handset comes with an improved design, up to date hardware and, best of all, a price tag of around $260.

Mi 4s utilizes the same processor as found in the more affordable Mi 4c, which I have reviewed here, namely a Qualcomm Snapdragon 808. That makes it significantly faster than Mi 4, but less impressive in this regard than the new Mi 5, which sports a top of the line Snapdragon 820 chip.

By Mihăiță Bamburic -
Password

Identifying users with behavioral biometrics

As we're regularly being told, passwords on their own are no longer sufficient to ensure our security. Businesses are therefore on the lookout for new ways to identify users without making the sign in process overly complicated.

Adaptive authentication specialist SecureAuth is launching the latest version of its product that includes behavioral biometrics, a new risk analysis technology that performs keystroke analysis and mouse movement analysis to determine a user's legitimacy and build a completely unique behavior-based profile on each user device.

By Ian Barker -
firewall_security

New platform improves efficiency of security operations

Security teams often have to spend a lot of their time investigating incidents, which is time consuming and can distract from other tasks.

To improve the efficiency of security operations centers (SOCs), Israel-based SECDO is launching a new platform aimed at managed security service providers (MSSPs).

By Ian Barker -
Mobile app threats

Enterprises have no protection against mobile malware

Mobile enterprise security firm MobileIron has released its Q4 2015 Mobile Security and Risk Review, discussing the threats and risks that enterprises face in their mobile deployments.

The report reveals the worrying find that more than 50 percent of enterprises have at least one non-compliant device, creating a broader attack surface for malware and data theft.

By Sam Pudwell -
facebook_reactions

Like! Facebook Reactions launch around the world

Facebook is, at long, long last, rolling out Reactions globally. The limitations of the famous Like button which have been debated since its introduction are set to become a thing of the past at the social network. Like is now joined by Love, Haha, Wow, Sad, and Angry options.

As we reported earlier in the year, the 'yay' option that had been tested is not being released at this stage -- apparently users found it difficult to interpret what it means. Reactions do not work exactly as you might expect them to, and this means you might need to be careful about how you use them to start with.

By Sofia Elizabella Wyciślik-Wilson -
Xiaomi Mi 5

Xiaomi's new Mi 5 offers flagship hardware at an affordable price

Xiaomi is once again proving that you do not need to spend a lot of money to get your hands on a flagship smartphone. Its new Mi 5, which is the successor to the popular Mi 4, offers top of the line hardware for just over $300.

Mi 5 offers just about anything you could want in a flagship smartphone. It makes you wonder whether it is worth ponying up for a similar device from LG or Samsung, which costs at least twice as much.

By Mihăiță Bamburic -
cloud padlock

85 percent of enterprises keep sensitive data in the cloud

According to a new report by enterprise security specialist Vormetric, 85 percent of senior IT security executives worldwide say they are using sensitive data in the cloud, up from 54 percent last year.

But even as they move to adopt cloud services, and in some cases believe that cloud environments are more secure than their local IT infrastructure, enterprises remain concerned about the security of their information.

By Ian Barker -
betanews logo

We don't just report the news: We live it. Our team of tech-savvy writers is dedicated to bringing you breaking news, in-depth analysis, and trustworthy reviews across the digital landscape.

x logo facebook logo linkedin logo rss feed logo

© 1998-2025 BetaNews, Inc. All Rights Reserved.